The Web management interface in Avaya SIP Enablement Services (SES) 3.x and 4.0, as used with Avaya Communication Manager 3.1.x, does not perform authentication for certain functionality, which allows remote attackers to obtain sensitive information and access restricted functionality via (1) the certificate installation utility, (2) unspecified scripts in the objects folder, (3) an “unnecessary default application,” (4) unspecified scripts in the states folder, (5) an unspecified “default application” that lists server configuration, and (6) “full system help.”
osvdb.org/46598
osvdb.org/46599
osvdb.org/46600
secunia.com/advisories/30751
support.avaya.com/elmodocs2/security/ASA-2008-268.htm
www.securityfocus.com/bid/29939
www.voipshield.com/research-details.php?id=86
www.voipshield.com/research-details.php?id=87
www.voipshield.com/research-details.php?id=88
www.voipshield.com/research-details.php?id=89
www.voipshield.com/research-details.php?id=90
www.voipshield.com/research-details.php?id=91
www.vupen.com/english/advisories/2008/1943/references
exchange.xforce.ibmcloud.com/vulnerabilities/43381
exchange.xforce.ibmcloud.com/vulnerabilities/43384
exchange.xforce.ibmcloud.com/vulnerabilities/43389
exchange.xforce.ibmcloud.com/vulnerabilities/43393
exchange.xforce.ibmcloud.com/vulnerabilities/43394
exchange.xforce.ibmcloud.com/vulnerabilities/43395